April 28th, 2022 | ๐
iSpeech.org On April 18, 2022, the Wordfence Threat Intelligence team initiated the disclosure process for an Object Injection vulnerability in
September 21st, 2021 | ๐
Convert Text to Speech ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking prepend
September 15th, 2021 | ๐
https://www.ispeech.org # Exploit Title: Facebook ParlAI 1.0.0 - Deserialization of Untrusted Data in parlai# Date: 2021-09-11# Exploit Author: Abhiram V#
July 21st, 2021 | ๐
https://www.ispeech.org*] Hello, Please find a text-only version below sent to security mailing lists. The complete version on "Multiple vulnerabilities in
July 20th, 2021 | ๐
https://www.ispeech.org/text.to.speech ------------------------------------------------------------------------Concrete5 < = 8.5.5 (Logging Settings) Phar Deserialization Vulnerability------------------------------------------------------------------------ -] Software Link: https://www.concrete5.org -] Affected Versions: Version 8.5.5 and
July 13th, 2021 | ๐
iSpeech ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRankingprepend Msf::Exploit::Remote::AutoCheckinclude Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::CmdStager def initialize(info
May 18th, 2021 | ๐
Powered by iSpeech ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking prepend
January 26th, 2021 | ๐
https://www.ispeech.org ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking prepend Msf::Exploit::Remote::AutoCheckinclude Msf::Exploit::Remote::HttpClientinclude
October 20th, 2020 | ๐
iSpeech ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking prepend Msf::Exploit::Remote::AutoCheckinclude Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::EXEinclude
October 20th, 2020 | ๐
iSpeech ------------------------------------------------------------------------Java deserialization vulnerability in QRadar RemoteJavaScript Servlet------------------------------------------------------------------------Abstract------------------------------------------------------------------------A Java deserialization vulnerability exists in the QRadarRemoteJavaScript Servlet. An authenticated user can
September 23rd, 2020 | ๐
iSpeech ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking include Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::CmdStagerprepend Exploit::Remote::AutoCheck
September 8th, 2020 | ๐
Text to Speech Voices CVSSv3.1 Score-------------------------------------------------AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Vendor-------------------------------------------------Hyland Software - (https://www.hyland.com/en/ and https://www.onbase.com/en/) Product-------------------------------------------------Hyland OnBaseAll derivatives based on OnBase Versions Affected-------------------------------------------------All
August 18th, 2020 | ๐
iSpeech ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking prepend Msf::Exploit::Remote::AutoCheckinclude Msf::Exploit::Remote::HttpClientinclude
August 1st, 2020 | ๐
iSpeech # This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::CmdStagerinclude
Gloss